Module 1 :- Overview Of Penetration Testing What is Penetration Testing? Why Penetration Testing? Steps of Penetration Testing? All Right all right. now we all know “what is Penetration Testing?”, “Why it is needed?”. Now its time for ‘How it is done?’ There are four basic steps of Penetration Testing…….Well the fifth one is Read more about 4 Steps of Penetration Testing[…]

Android apps for visually impaired We all saw Matt Murdock using an Android phone. it has android apps for visually impaired pre installed. The world is on the rise with this tech, the blind should too. So here today, we are going to discuss the apps that can help the visually stunted. Scanlife Barcode and QR Reader Read more about Top 10 android apps for visually impaired[…]

This article marks for an inception of something new, something cool, something to brag about and something that makes you feel more tech savvy. Android started to come to the surface in 2008. Since then, billions of gadgets from thousands of companies have embedded it in their roots. And naturally, more developers, whether from a Read more about Android for beginners-Part 1[…]

MODULE 3:- Basics of Kali Linux Install Kali Linux on Hard drive with Full disk Encryption How to create Kali Linux bootable USB live in windows 10 20 basics about how to use Kali Linux 6 steps to change Kali Linux IP address (Easy) How to Add Kali Linux repository – With pictures How to Read more about 20 basics about how to use Kali Linux[…]

Ransomware: What is it? Let’s go by the wiki definition with this one. The meaning is simple enough, the RansomWare infects the system and holds it for ransom. By infecting here, it means that the malware operators disable one particular(mostly crucial) function in the system and will only enable it back if the victim system’s owner pays Read more about The first JavaScript powered RansomWare Ransom32[…]

Die Hard 4.0 seems real enough now as we have the world’s first power outage accomplished by a malware. The culprits are…..you guessed it, the blackhats. Now hackers have used a highly elegant and destructive malware to successfully infect at least three regional Ukrainian power authorities. So, their pre-Christmas 23rd December was pretty much a …lights out. The Read more about World’s first Power outage using Malware[…]